CN113971267A - Identity authentication method and device, storage medium and electronic equipment - Google Patents

Identity authentication method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113971267A
CN113971267A CN202111254633.1A CN202111254633A CN113971267A CN 113971267 A CN113971267 A CN 113971267A CN 202111254633 A CN202111254633 A CN 202111254633A CN 113971267 A CN113971267 A CN 113971267A
Authority
CN
China
Prior art keywords
identity information
encrypted
user
platform
networking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111254633.1A
Other languages
Chinese (zh)
Inventor
鲁筱璇
王安定
周宇翔
吴沅宣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202111254633.1A priority Critical patent/CN113971267A/en
Publication of CN113971267A publication Critical patent/CN113971267A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses an identity authentication method and device, a storage medium and electronic equipment, which can be applied to the field of network security or the field of finance. The method comprises the following steps: when a request for carrying out identity authentication on a user is received, user identity information corresponding to the user is determined. And connecting the networking check platform and judging whether the networking check platform is successfully accessed at present. And if the networking check platform is not successfully accessed at present, encrypting the user identity information based on a preset encryption algorithm to obtain the encrypted user identity information. And acquiring a plurality of pieces of encrypted identity information which are stored in advance. And judging whether encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information, and if so, determining that the user passes identity authentication. By the method, when the networking check platform is difficult to access, the identity authentication can be performed on the user, inconvenience to the user is avoided, and service experience of the user is improved.

Description

Identity authentication method and device, storage medium and electronic equipment
Technical Field
The present invention relates to the field of authentication technologies, and in particular, to an identity authentication method and apparatus, a storage medium, and an electronic device.
Background
The online business service of enterprise organizations such as banks is one of the important ways for users to obtain business service. In the process of transacting business by a business system on a line, the business system usually needs to authenticate the identity of a user so as to ensure the safety of business transaction.
At present, when a service system authenticates a user, the service system generally accesses a networking inspection platform such as a networking inspection system in real time through a unified interface based on a data transmission network used by the user so as to authenticate the user.
In practical application scenarios, it is sometimes necessary to perform authentication on a user in a poor network environment, for example, the user uses a service system in a region with a large traffic or in a poor network signal. Based on the existing identity authentication method, under the condition of poor network signals, the platform such as a networking check system and the like is difficult to access, the identity authentication of the user is easy to fail, and then the business transaction cannot be continuously processed, so that great inconvenience is brought to the user, and the service experience of the user is poor.
Disclosure of Invention
In view of this, the embodiment of the present invention provides an identity authentication method to solve the problem that, in the case of a poor network signal, the user's identity authentication is likely to fail, so that the user's service experience is poor.
The embodiment of the invention also provides an identity authentication device which is used for ensuring the actual realization and application of the method.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
an identity verification method comprising:
when a request for carrying out identity authentication on a user is received, determining user identity information corresponding to the user;
connecting a networking check platform and judging whether the networking check platform is successfully accessed at present;
if the networking check platform is not successfully accessed at present, encrypting the user identity information based on a preset encryption algorithm to obtain encrypted user identity information;
acquiring a plurality of pre-stored encrypted identity information from a local database;
judging whether encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information;
and if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information, determining that the user passes identity authentication.
Optionally, in the method, the encrypting the user identity information based on a preset encryption algorithm includes:
and encrypting the user identity information based on the public key issued by the networking verification platform.
Optionally, the above method includes a storage process of the plurality of encrypted identity information, including:
sending an encrypted information acquisition request to the networked checking platform so that the networked checking platform determines a plurality of user identity information corresponding to the encrypted information acquisition request, and encrypting the plurality of user identity information respectively based on the public key to obtain a plurality of encrypted identity information;
and acquiring the plurality of encrypted identity information, and storing the plurality of encrypted identity information to the local database.
Optionally, the determining whether there is encrypted identity information matching the encrypted user identity information in the plurality of encrypted identity information includes:
comparing the encrypted user identity information with each encrypted identity information in the plurality of encrypted identity information respectively;
if the encrypted user identity information is the same as any one of the plurality of encrypted identity information, determining that the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information.
The above method, optionally, further includes:
if the networking check platform is successfully accessed at present, generating a networking check request corresponding to the user identity information;
sending the networking check request to the networking check platform, and acquiring a check result corresponding to the networking check request determined by the networking check platform;
and determining an identity verification result corresponding to the user based on the checking result.
The above method, optionally, further includes:
and if the encrypted identity information matched with the encrypted user identity information does not exist in the plurality of encrypted identity information, determining that the user does not pass identity authentication.
The above method, optionally, further includes:
and generating a local verification record corresponding to the user so as to facilitate verification.
An authentication apparatus comprising:
the first determining unit is used for determining user identity information corresponding to a user when a request for carrying out identity authentication on the user is received;
the first judgment unit is used for connecting the networking check platform and judging whether the networking check platform is successfully accessed at present;
the encryption unit is used for encrypting the user identity information based on a preset encryption algorithm to obtain encrypted user identity information if the networking check platform is not successfully accessed at present;
the system comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is used for acquiring a plurality of pre-stored encrypted identity information from a local database;
a second determining unit, configured to determine whether encrypted identity information matching the encrypted user identity information exists in the multiple pieces of encrypted identity information;
and the second determining unit is used for determining that the user passes the identity authentication if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information.
A storage medium comprising stored instructions, wherein the instructions, when executed, control a device on which the storage medium is located to perform an authentication method as described above.
An electronic device comprising a memory, and one or more instructions, wherein the one or more instructions are stored in the memory and configured to be executed by one or more processors to perform an authentication method as described above.
An identity authentication method provided based on the above embodiment of the present invention includes: when a request for carrying out identity authentication on a user is received, user identity information corresponding to the user is determined. And connecting the networking check platform and judging whether the networking check platform is successfully accessed at present. And if the networking check platform is not successfully accessed at present, encrypting the user identity information corresponding to the user based on a preset encryption algorithm to obtain the encrypted user identity information. And acquiring a plurality of pre-stored encrypted identity information from a local database, and judging whether encrypted identity information matched with the encrypted user identity information exists in the encrypted identity information. And if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information, determining that the user passes the identity authentication. By applying the method provided by the embodiment of the invention, under the condition that the networking check platform is not successfully accessed, the user identity information corresponding to the user can be encrypted, and the user identity is verified through matching of the pre-stored encrypted identity information and the encrypted user identity information. When the network signal is poor and the networking check platform is difficult to access, the identity authentication can be carried out on the user, the business transaction process of the user is promoted, inconvenience is avoided for the user, and the service experience of the user can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method of authentication according to an embodiment of the present invention;
fig. 2 is a flowchart of another method of an authentication method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In this application, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
As can be seen from the background art, the current authentication method generally accesses a networking verification platform for verification, has strong dependence on a data transmission network, is generally difficult to access the networking verification platform under the condition of poor network signals, and cannot authenticate a user, so that the user cannot continue business transaction or needs to request manual assistance processing, which brings inconvenience to the user and makes the service experience of the user poor.
Therefore, the embodiment of the invention provides an identity authentication method and device, a storage medium and an electronic device, which can be used for carrying out identity authentication on a user by combining pre-stored encrypted identity information, can also finish the identity authentication process of the user under the condition of poor network signals, can avoid inconvenience for the user, and improves the service experience of the user.
It should be noted that the identity authentication method and apparatus, the storage medium, and the electronic device provided by the present invention can be used in the network security field or the financial field. The above description is only an example, and does not limit the application fields of the authentication method and apparatus, the storage medium, and the electronic device provided by the present invention.
The embodiment of the invention provides an identity authentication method, which can be applied to a business system of a bank, wherein an execution subject of the method can be a server of the system, and a flow chart of the method is shown in figure 1 and comprises the following steps:
s101: when a request for carrying out identity authentication on a user is received, determining user identity information corresponding to the user;
in the method provided by the embodiment of the invention, when a user logs in a service system or transacts service transactions through the service system, the front end can acquire user identity information input by the user and send a request for performing identity verification on the user to the server based on the user identity information.
When the server receives the authentication request, the server can acquire the user identity information corresponding to the user contained in the request.
S102: connecting a networking check platform and judging whether the networking check platform is successfully accessed at present;
in the method provided by the embodiment of the invention, a connection request can be sent to the networking check platform through the pre-established connection interface so as to try to connect the networking check platform. The networked verification platform can be a networked verification citizenship information system, and can also be other systems for identity information verification. Whether the networking check platform is accessed currently can be judged by judging whether a response corresponding to the connection request is received.
S103: encrypting the user identity information based on a preset encryption algorithm to obtain encrypted user identity information;
in the method provided by the embodiment of the invention, if the networking check platform is not successfully accessed at present, the user identity information corresponding to the user is encrypted based on a preset encryption algorithm to obtain the encrypted user identity information. In particular, it may be encrypted by a key. It should be noted that a specific encryption method can be selected according to actual requirements, and the method implementation function provided by the embodiment of the present invention is not affected.
S104: acquiring a plurality of pre-stored encrypted identity information from a local database;
in the method provided by the embodiment of the invention, a plurality of encrypted identity information are stored in advance, and the encrypted identity information can be information obtained by encrypting the personal identity information of each registered user of a bank in advance by the networking check platform. The encryption algorithm for encrypting the personal identity information by the networking check platform is the same as the encryption algorithm in step S103. The service system can acquire each encrypted identity information in advance and store the encrypted identity information in a local database. And under the condition that the networking check platform is not successfully accessed currently, each piece of pre-stored encrypted identity information can be acquired from the local database.
S105: judging whether encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information;
in the method provided by the embodiment of the present invention, each encrypted identity information may be respectively matched with the encrypted user identity information, so as to determine whether there is encrypted identity information that matches the encrypted user identity information in the plurality of encrypted identity information.
S106: and determining that the user passes the authentication.
In the method provided by the embodiment of the present invention, if there is encrypted identity information matching with the encrypted user identity information in the plurality of encrypted identity information, the user may continue to process subsequent service transactions through identity authentication.
Based on the method provided by the embodiment of the invention, when a request for carrying out identity authentication on a user is received, the user identity information corresponding to the user is determined. And connecting the networking check platform and judging whether the networking check platform is successfully accessed at present. And if the networking check platform is not successfully accessed at present, encrypting the user identity information based on a preset encryption algorithm to obtain the encrypted user identity information. The method comprises the steps of obtaining a plurality of pieces of encrypted identity information stored in advance from a local database, and judging whether encrypted identity information matched with the encrypted user identity information exists in the plurality of pieces of encrypted identity information. And if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information, determining that the user passes the identity authentication. By applying the method provided by the embodiment of the invention, the identity of the user can be verified based on the matching of the encrypted identity information pre-stored in the local database and the encrypted user identity information. Under the condition that the network signal is poor and the networking check platform is not successfully accessed, the authentication process of the user can be completed, the business transaction process of the user is promoted, inconvenience can be avoided for the user, the business processing efficiency is improved, and the service experience of the user is favorably improved. In the method provided by the embodiment of the invention, the encrypted identity information is stored in the local database, so that the identity authentication can be completed under the condition that the individual plaintext information of the citizen is not stored, and the local identity authentication can be realized under the condition that the safety of the individual information is ensured.
Further, on the basis of the method shown in fig. 1, an embodiment of the present invention provides another identity verification method, where the process of encrypting the user identity information based on a preset encryption algorithm in step S103 includes:
and encrypting the user identity information based on the public key issued by the networking verification platform.
In the method provided by the embodiment of the invention, the networking check platform can encrypt the information by adopting an asymmetric encryption algorithm to obtain each piece of encrypted identity information stored in the local database of the service system. The public key is used for encryption in the asymmetric encryption algorithm adopted by the networking check platform, and the public key in the asymmetric encryption algorithm, namely the public key, can be published to the service system. When the user is authenticated, the user identity information corresponding to the current user can be encrypted based on the public key.
Based on the method provided by the embodiment of the invention, the service system can encrypt the user identity information through the public key issued by the networking check platform, and can ensure the consistency of the encrypted user identity information and the encryption mode of each encrypted identity information. And the service system does not have a private key, and the encrypted identity information cannot be decrypted, so that the security of the personal information is guaranteed.
To better illustrate the method provided by the embodiment of the present invention, on the basis of the method provided by the above embodiment, the embodiment of the present invention provides another identity authentication method, wherein the storing process of the plurality of pieces of encrypted identity information, which is mentioned in step S104, includes:
sending an encrypted information acquisition request to the networked checking platform so that the networked checking platform determines a plurality of user identity information corresponding to the encrypted information acquisition request, and encrypting the plurality of user identity information respectively based on the public key to obtain a plurality of encrypted identity information;
in the method provided by the embodiment of the present invention, the service system may send the encrypted information acquisition request to the networked verification platform in advance, so as to request the networked verification platform to feed back the encrypted identity information to the networked verification platform. The service system can only request to send the encrypted identity information obtained by encrypting the personal identity information of each registered user recorded by the bank.
When the networking check platform receives a request of a system, each user corresponding to the request can be determined, the personal identity information of each user corresponding to the request is obtained to obtain a plurality of user identity information corresponding to the request, and each user identity information in the plurality of user identity information is encrypted respectively based on a public key in an asymmetric encryption algorithm to obtain a plurality of encrypted identity information corresponding to the plurality of user identity information.
And acquiring the plurality of encrypted identity information, and storing the plurality of encrypted identity information to the local database.
In the method provided by the embodiment of the present invention, after the networking check platform obtains the plurality of encrypted identity information corresponding to the plurality of user identity information through encryption processing, the plurality of encrypted identity information can be fed back to the service system, and after the system obtains the plurality of encrypted identity information, the encrypted identity information can be stored in the local database.
Based on the method provided by the embodiment of the invention, the networking check platform can encrypt the personal identity information based on the asymmetric encryption algorithm, and the service system only has the public key for encryption and cannot decrypt the encrypted identity information, thereby being beneficial to ensuring the personal information safety. And secondly, only the encrypted identity information of the bank user is stored in the local database, so that the data storage capacity can be reduced, the data comparison quantity can be reduced, and the data processing efficiency can be further improved.
Further, on the basis of the method provided by the foregoing embodiment, an embodiment of the present invention provides another identity authentication method, wherein the step of determining whether there is encrypted identity information that matches the encrypted user identity information in the plurality of pieces of encrypted identity information in step S105 includes:
comparing the encrypted user identity information with each encrypted identity information in the plurality of encrypted identity information respectively;
if the encrypted user identity information is the same as any one of the plurality of encrypted identity information, determining that the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information.
In the method provided by the embodiment of the invention, the encrypted user identity information can be respectively compared with each encrypted identity information prestored in the local database, the two types of identity information are both obtained by encrypting through the same encryption algorithm, and if the two types of identity information are the same, the corresponding plaintext identity information before encryption is also the same. Therefore, if any encrypted identity information is the same as the encrypted user identity information in each encrypted identity information, it is determined that encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information.
To better explain the method provided by the embodiment of the present invention, on the basis of the method shown in fig. 1, the embodiment of the present invention provides another identity authentication method, and the method provided by the embodiment of the present invention further includes:
if the networking check platform is successfully accessed at present, generating a networking check request corresponding to the user identity information;
in the method provided in the embodiment of the present invention, if it is determined that the user has successfully accessed the networking check platform in the determination process of step S102, that is, the user can be authenticated through the networking check platform, a corresponding networking check request is generated based on the user identity information corresponding to the current user.
Sending the networking check request to the networking check platform, and acquiring a check result corresponding to the networking check request determined by the networking check platform;
in the method provided by the embodiment of the invention, the networking check request corresponding to the user identity information can be sent to the networking check platform based on the preset connection interface, so that the networking check platform can check the user identity information, the networking check platform can check the authenticity of the user identity information based on the personal identity information in the platform to obtain a check result, for example, the user identity information comprises a personal name and a citizen identity number, the networking check platform can check the submitted personal name and the submitted citizen identity number, and if the information is consistent with the information in the platform, a check result with consistent information check is obtained. And taking the checking result as the checking result corresponding to the networking checking request. The networked checking platform can feed back the checking result to the service system.
And determining an identity verification result corresponding to the user based on the checking result.
In the method provided by the embodiment of the invention, after the service system acquires the checking result sent by the networking checking platform, the identity verification result of the current user can be determined according to the information which is used for checking the information in a consistent or inconsistent manner. And if the checking result is that the information is checked to be consistent, determining that the current user passes the identity authentication, and if the checking result is that the information is checked to be inconsistent, determining that the current user does not pass the identity authentication.
Based on the method provided by the embodiment of the invention, under the condition that the networking check platform can be successfully accessed, the identity of the user can be verified based on the check result of the networking check platform, which is favorable for ensuring the accuracy of the identity verification of the user.
Further, on the basis of the method shown in fig. 1, the method provided in the embodiment of the present invention further includes:
and if the encrypted identity information matched with the encrypted user identity information does not exist in the plurality of encrypted identity information, determining that the user does not pass identity authentication.
In the method provided in the embodiment of the present invention, in the determining process in step S105, if it is determined that each encrypted identity information in the plurality of encrypted identity information is not matched with the encrypted user identity information, it is determined that the current user does not pass the identity authentication, and the user is not allowed to perform the subsequent service transaction operation.
Based on the method provided by the embodiment of the invention, if each encrypted identity information is not matched with the encrypted user identity information, the current user can be determined not to pass identity verification, the identity verification process of the current user is completed, the business transaction process of the current user is ended in time, and the transaction safety can be ensured.
To better explain the method provided by the embodiment of the present invention, in combination with the flowchart shown in fig. 2, the embodiment of the present invention provides another identity authentication method, and on the basis of the method shown in fig. 1, the method provided by the embodiment of the present invention further includes:
s107: and generating a local verification record corresponding to the user.
In the method provided by the embodiment of the invention, after the current user is confirmed to pass the identity authentication, the local authentication record corresponding to the user can be generated, that is, the identity authentication of the current user is recorded based on the encrypted identity information stored in the local database, and the business transaction generated by the current user can be marked, so as to facilitate the subsequent check, for example, the identity authentication of the user corresponding to the local authentication record is performed subsequently through the networked check platform, and if the identity authentication is abnormal, the business transaction generated by the user can be checked.
Based on the method provided by the embodiment of the invention, the user who performs identity authentication based on the local database can be recorded, the corresponding business transaction is marked, and the subsequent further verification can be performed, which is favorable for ensuring the safety of the business transaction.
Further, in the method provided by the embodiment of the present invention, after the user identity authentication process is completed, the user identity information corresponding to the user may be deleted, so as to ensure the user information security and avoid user information leakage.
Corresponding to the identity authentication method shown in fig. 1, an embodiment of the present invention further provides an identity authentication apparatus for implementing the method shown in fig. 1, where a schematic structural diagram of the identity authentication apparatus is shown in fig. 3, and the identity authentication apparatus includes:
a first determining unit 201, configured to determine, when a request for performing authentication on a user is received, user identity information corresponding to the user;
a first judging unit 202, configured to connect to a networking check platform, and judge whether the networking check platform is successfully accessed currently;
the encryption unit 203 is configured to encrypt the user identity information based on a preset encryption algorithm if the networking check platform is not successfully accessed currently, so as to obtain encrypted user identity information;
an obtaining unit 204, configured to obtain a plurality of pieces of encrypted identity information stored in advance from a local database;
a second determining unit 205, configured to determine whether there is encrypted identity information that matches the encrypted user identity information in the plurality of encrypted identity information;
a second determining unit 206, configured to determine that the user passes the authentication if encrypted identity information matching the encrypted user identity information exists in the plurality of encrypted identity information.
Based on the device provided by the embodiment of the invention, when a request for carrying out identity authentication on a user is received, the user identity information corresponding to the user is determined. And connecting the networking check platform and judging whether the networking check platform is successfully accessed at present. And if the networking check platform is not successfully accessed at present, encrypting the user identity information based on a preset encryption algorithm to obtain the encrypted user identity information. The method comprises the steps of obtaining a plurality of pieces of encrypted identity information stored in advance from a local database, and judging whether encrypted identity information matched with the encrypted user identity information exists in the plurality of pieces of encrypted identity information. And if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information, determining that the user passes the identity authentication. By applying the device provided by the embodiment of the invention, the identity of the user can be verified based on the matching of the encrypted identity information pre-stored in the local database and the encrypted user identity information. Under the condition that the network signal is poor and the networking check platform is not successfully accessed, the authentication process of the user can be completed, the business transaction process of the user is promoted, inconvenience can be avoided for the user, the business processing efficiency is improved, and the service experience of the user is favorably improved. In the device provided by the embodiment of the invention, the encrypted identity information is stored in the local database, so that the identity authentication can be completed under the condition that the individual plaintext information of the citizen is not stored, and the local identity authentication can be realized under the condition that the safety of the individual information is ensured.
On the basis of the apparatus provided in the foregoing embodiment, in the apparatus provided in the embodiment of the present invention, the encryption unit 203 includes:
and the encryption subunit is used for encrypting the user identity information based on the public key issued by the networking check platform.
On the basis of the device provided by the above embodiment, the device provided by the embodiment of the present invention further includes:
a request sending unit, configured to send an encrypted information acquisition request to the networked verification platform, so that the networked verification platform determines a plurality of user identity information corresponding to the encrypted information acquisition request, and encrypts the plurality of user identity information based on the public key respectively to obtain a plurality of encrypted identity information;
and the storage unit is used for acquiring the encrypted identity information and storing the encrypted identity information to the local database.
In addition to the apparatus provided in the foregoing embodiment, in the apparatus provided in an embodiment of the present invention, the second determining unit 205 includes:
a comparison subunit, configured to compare the encrypted user identity information with each encrypted identity information in the multiple encrypted identity information respectively;
a determining subunit, configured to determine that encrypted identity information that matches the encrypted user identity information exists in the plurality of encrypted identity information if the encrypted user identity information is the same as any encrypted identity information in the plurality of encrypted identity information.
On the basis of the device provided by the above embodiment, the device provided by the embodiment of the present invention further includes:
the networking checking unit is used for generating a networking checking request corresponding to the user identity information if the networking checking platform is successfully accessed at present; sending the networking check request to the networking check platform, and acquiring a check result corresponding to the networking check request determined by the networking check platform; and determining an identity verification result corresponding to the user based on the checking result.
On the basis of the device provided by the above embodiment, the device provided by the embodiment of the present invention further includes:
a third determining unit, configured to determine that the user fails to perform authentication if encrypted identity information matching the encrypted user identity information does not exist in the plurality of encrypted identity information.
Further, an embodiment of the present invention provides another identity authentication apparatus, a schematic structural diagram of which is shown in fig. 4, and on the basis of the apparatus shown in fig. 3, the apparatus provided in the embodiment of the present invention further includes:
a recording unit 207, configured to generate a local verification record corresponding to the user, so as to facilitate verification.
The embodiment of the present invention further provides a storage medium, where the storage medium includes stored instructions, and when the instructions are executed, the device where the storage medium is located is controlled to execute the above identity authentication method.
An electronic device is provided in an embodiment of the present invention, and the structural diagram of the electronic device is shown in fig. 5, which specifically includes a memory 301 and one or more instructions 302, where the one or more instructions 302 are stored in the memory 301 and configured to be executed by one or more processors 303 to perform the following operations for the one or more instructions 302:
when a request for carrying out identity authentication on a user is received, determining user identity information corresponding to the user;
connecting a networking check platform and judging whether the networking check platform is successfully accessed at present;
if the networking check platform is not successfully accessed at present, encrypting the user identity information based on a preset encryption algorithm to obtain encrypted user identity information;
acquiring a plurality of pre-stored encrypted identity information from a local database;
judging whether encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information;
and if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information, determining that the user passes identity authentication.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. An identity verification method, comprising:
when a request for carrying out identity authentication on a user is received, determining user identity information corresponding to the user;
connecting a networking check platform and judging whether the networking check platform is successfully accessed at present;
if the networking check platform is not successfully accessed at present, encrypting the user identity information based on a preset encryption algorithm to obtain encrypted user identity information;
acquiring a plurality of pre-stored encrypted identity information from a local database;
judging whether encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information;
and if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information, determining that the user passes identity authentication.
2. The method according to claim 1, wherein the encrypting the user identity information based on a preset encryption algorithm comprises:
and encrypting the user identity information based on the public key issued by the networking verification platform.
3. The method of claim 2, wherein the storing of the plurality of encrypted identity information comprises:
sending an encrypted information acquisition request to the networked checking platform so that the networked checking platform determines a plurality of user identity information corresponding to the encrypted information acquisition request, and encrypting the plurality of user identity information respectively based on the public key to obtain a plurality of encrypted identity information;
and acquiring the plurality of encrypted identity information, and storing the plurality of encrypted identity information to the local database.
4. The method according to claim 1, wherein the determining whether there is encrypted identity information matching the encrypted user identity information in the plurality of encrypted identity information includes:
comparing the encrypted user identity information with each encrypted identity information in the plurality of encrypted identity information respectively;
if the encrypted user identity information is the same as any one of the plurality of encrypted identity information, determining that the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information.
5. The method of claim 1, further comprising:
if the networking check platform is successfully accessed at present, generating a networking check request corresponding to the user identity information;
sending the networking check request to the networking check platform, and acquiring a check result corresponding to the networking check request determined by the networking check platform;
and determining an identity verification result corresponding to the user based on the checking result.
6. The method of claim 1, further comprising:
and if the encrypted identity information matched with the encrypted user identity information does not exist in the plurality of encrypted identity information, determining that the user does not pass identity authentication.
7. The method of claim 1, further comprising:
and generating a local verification record corresponding to the user so as to facilitate verification.
8. An authentication apparatus, comprising:
the first determining unit is used for determining user identity information corresponding to a user when a request for carrying out identity authentication on the user is received;
the first judgment unit is used for connecting the networking check platform and judging whether the networking check platform is successfully accessed at present;
the encryption unit is used for encrypting the user identity information based on a preset encryption algorithm to obtain encrypted user identity information if the networking check platform is not successfully accessed at present;
the system comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is used for acquiring a plurality of pre-stored encrypted identity information from a local database;
a second determining unit, configured to determine whether encrypted identity information matching the encrypted user identity information exists in the multiple pieces of encrypted identity information;
and the second determining unit is used for determining that the user passes the identity authentication if the encrypted identity information matched with the encrypted user identity information exists in the plurality of encrypted identity information.
9. A storage medium comprising stored instructions, wherein the instructions, when executed, control a device on which the storage medium resides to perform the authentication method according to any one of claims 1 to 7.
10. An electronic device comprising a memory, and one or more instructions stored in the memory and configured to be executed by one or more processors to perform the method of any one of claims 1-7.
CN202111254633.1A 2021-10-27 2021-10-27 Identity authentication method and device, storage medium and electronic equipment Pending CN113971267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111254633.1A CN113971267A (en) 2021-10-27 2021-10-27 Identity authentication method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111254633.1A CN113971267A (en) 2021-10-27 2021-10-27 Identity authentication method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113971267A true CN113971267A (en) 2022-01-25

Family

ID=79588568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111254633.1A Pending CN113971267A (en) 2021-10-27 2021-10-27 Identity authentication method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113971267A (en)

Similar Documents

Publication Publication Date Title
JP6514218B2 (en) Client authentication using social data
US20200026834A1 (en) Blockchain identity safe and authentication system
CN112199714B (en) Privacy protection method and device based on block chain and electronic equipment
US9596089B2 (en) Method for generating a certificate
CN109274652B (en) Identity information verification system, method and device and computer storage medium
EP3933624B1 (en) Blockchain-based identity verification method and related hardware
CN108805573A (en) A kind of Information Authentication method, server and storage medium
US8818906B1 (en) Systems and methods for performing authentication of a customer interacting with a banking platform
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
WO2007137368A1 (en) Method and system for verification of personal information
KR20130107188A (en) Server and method for authentication using sound code
CN110311895B (en) Session permission verification method and system based on identity authentication and electronic equipment
CN110222085B (en) Processing method and device for certificate storage data and storage medium
US20240095318A1 (en) Digital identity sign-up
CN111275419A (en) Block chain wallet signature right confirming method, device and system
CN113472716A (en) System access method, gateway device, server, electronic device, and storage medium
WO2018148900A1 (en) Fingerprint identification-based authentication method and device, and transaction system
CN115760082A (en) Digital payment processing method, device, equipment, system and medium
WO2019144948A1 (en) Decentralized biometric authentication platform
CN112528268B (en) Cross-channel applet login management method and device and related equipment
CN113205342A (en) User identity authentication method and device based on multi-terminal payment
CN109816525A (en) A kind of data processing method and its device, medium, terminal
CN113971267A (en) Identity authentication method and device, storage medium and electronic equipment
CN111970117B (en) Certificate downloading method, device and equipment
CN106533685B (en) Identity authentication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination